Minimizing Damage From Cyberattacks with Stuart Madnick - a podcast by Chris Parker

from 2022-05-18T10:00:59

:: ::

Many use the internet considering it more like a walk in the park rather than realizing it is more like a trip down a dark alley. Today’s guest is Stuart Madnick. Professor Madnick has been a faculty member at MIT since 1972. He has served as the head of MIT’s IT group for more than 20 years. During that time, the group has been consistently rated number 1 in the nation among schools for information technology programs. Dr. Madnick is a prolific writer and author or co-author of over 380 books, articles, or technical reports and textbooks. He has a degree in Electronic Engineering, Management, and Computer Science from MIT. He has been a visiting professor at Harvard University and six additional countries.

Show Notes:

  • [1:10] - Dr. Madnick shares his background and current role at MIT.
  • [2:53] - There were examples of cybersecurity attacks predating the internet through floppy disks.
  • [4:02] - In the late 90s and early 2000s, the internet experienced a boom of users.
  • [5:50] - In other industries, safety is a priority.
  • [6:53] - Everything, even toothbrushes, have computers in them.
  • [8:30] - Most know of the common scams, but there are people who still fall victim to them.
  • [9:18] - Some of the really poorly written scam emails are intentionally created this way to find the most gullible.
  • [10:15] - Dr. Madnick describes spear phishing and the rise in these cases.
  • [11:30] - In some cases, only a couple hundred dollars could be enough for a scammer and they add up quickly.
  • [13:03] - Don’t feel bad if you are hit by a believable scam.
  • [14:11] - Most people do not consider what to do to minimize damage.
  • [16:56] - If something bad happens to your computer and/or your data, what is your plan?
  • [18:54] - Dr. Madnick shares some corporate examples of cyberattacks.
  • [20:23] - We constantly have several subconscious decisions that we don’t consider the consequences of.
  • [22:16] - Maintaining certificates and security is a tedious and manual task.
  • [23:51] - Data is tracked by how attacks were successful rather than how many were unsuccessful.
  • [26:10] - Larger companies are starting to give more attention to cybersecurity but the progress is very slow.
  • [28:31] - Cybersecurity can be considered a catastrophe.
  • [29:30] - What does a cyber catastrophe look like?
  • [31:40] - Outages and malfunctions are possible and in catastrophes, a solution can take weeks or more.
  • [33:22] - It may not be likely that a catastrophe will happen, but it is possible, and we are unprepared.
  • [36:12] - You can’t avoid all risks, but you can minimize the damage done.
  • [39:31] - Cybersecurity tends to be a low priority.
  • [41:17] - What is a “zero-click vulnerability?”
  • [43:12] - Cybersecurity education is outdated in most schools.
  • [44:43] - You can put a better lock on your front door, but if you put your key under the mat, are you any more secure?

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. 

Links and Resources:

Further episodes of Easy Prey

Further podcasts by Chris Parker

Website of Chris Parker